Static task
static1
Behavioral task
behavioral1
Sample
088dfb036d42c957aa5b5d5f776798b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
088dfb036d42c957aa5b5d5f776798b6.exe
Resource
win10v2004-20231215-en
General
-
Target
088dfb036d42c957aa5b5d5f776798b6
-
Size
176KB
-
MD5
088dfb036d42c957aa5b5d5f776798b6
-
SHA1
443542105145713f0b99b9fb921bdbdbb47e644e
-
SHA256
09ed9c60dd9db9199b519eaeb596391d76a7a87650302fcf84ae098098582345
-
SHA512
8d08e8fb3f541375724359371c60578fedc6abff61990d74e8b56ba2ede3c7ed4a147402e428af067a33c45dde96398b59469a03053574b874fe4009a7741724
-
SSDEEP
1536:NCQZolCIRewjhfCmdcbLBtzfbO81YFNpSgB5z9ccUwxDiP4jAAMhV6whUQ7oKVn7:dFIDEQcbLjx6FjhdbjnMhTxnM3AcQG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 088dfb036d42c957aa5b5d5f776798b6
Files
-
088dfb036d42c957aa5b5d5f776798b6.exe windows:4 windows x86 arch:x86
74b7bc649f29aa64e283778b5a435e18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memcpy
log
comctl32
ImageList_GetBkColor
ImageList_Destroy
ImageList_Create
ImageList_Write
ImageList_DragShowNolock
ImageList_Draw
ImageList_Remove
ImageList_Read
ImageList_Add
kernel32
GlobalAddAtomA
SizeofResource
GetEnvironmentStrings
GlobalDeleteAtom
GetCPInfo
WideCharToMultiByte
lstrcmpA
InitializeCriticalSection
EnumCalendarInfoA
GetDateFormatA
lstrcpynA
DeleteFileA
GetFullPathNameA
MulDiv
GetDiskFreeSpaceA
CreateEventA
CompareStringA
GetLastError
SetEvent
LocalAlloc
Sleep
GlobalFindAtomA
LoadResource
MoveFileExA
LoadLibraryA
GetACP
SetLastError
lstrcmpiA
lstrcatA
LocalFree
ExitThread
lstrcpyA
MoveFileA
VirtualAlloc
FindClose
GetStringTypeA
lstrlenA
WaitForSingleObject
GetLocalTime
GetTickCount
GlobalAlloc
SetErrorMode
FreeResource
GetLocaleInfoA
VirtualQuery
ExitProcess
GetModuleHandleA
GetStdHandle
FindFirstFileA
GetThreadLocale
LoadLibraryExA
GetOEMCP
GetProcessHeap
CreateFileA
RaiseException
GetVersionExA
VirtualAllocEx
HeapDestroy
SetHandleCount
FreeLibrary
ReadFile
ResetEvent
LocalReAlloc
GetCurrentThreadId
CloseHandle
SetThreadLocale
user32
GetSubMenu
GetClipboardData
GetFocus
FillRect
GetWindow
GetDC
CharToOemA
EndPaint
MessageBoxA
SetWindowTextA
CharLowerA
CreateWindowExA
GetCursorPos
GetKeyNameTextA
GetSysColor
SetTimer
DrawIconEx
DispatchMessageW
GetClassLongA
FrameRect
SetWindowPos
GetClassInfoA
ShowWindow
CreateMenu
GetClientRect
CharLowerBuffA
DefWindowProcA
GetMenuStringA
DispatchMessageA
EnumChildWindows
TrackPopupMenu
GetDesktopWindow
RegisterClassA
GetParent
ShowScrollBar
IsWindowVisible
SetWindowLongA
GetDCEx
GetScrollPos
IsWindowEnabled
GetPropA
DrawEdge
EndDeferWindowPos
EnumThreadWindows
IsMenu
GetScrollRange
CreatePopupMenu
SetCursor
EnumWindows
DrawTextA
GetMenuItemID
GetMenuItemInfoA
CallNextHookEx
GetCursor
DrawIcon
CheckMenuItem
IsDialogMessageA
IsChild
GetMenuItemCount
BeginPaint
CreateIcon
GetKeyState
GetMessagePos
ClientToScreen
DrawFrameControl
GetSysColorBrush
GetDlgItem
GetCapture
GetLastActivePopup
HideCaret
Sections
.text Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 124KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE